Search

Your search keyword '"symbolic execution"' showing total 802 results

Search Constraints

Start Over You searched for: Descriptor "symbolic execution" Remove constraint Descriptor: "symbolic execution" Topic business.industry Remove constraint Topic: business.industry
802 results on '"symbolic execution"'

Search Results

2. Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software

3. SpecSafe: detecting cache side channels in a speculative world

4. Dynamic Property Enforcement in Programmable Data Planes

5. Information-flow control on ARM and POWER multicore processors

6. Diversifying Focused Testing for Unit Testing

7. Software Testing or The Bugs’ Nightmare

8. Automatic Vulnerability Detection in Embedded Devices and Firmware

9. Specification-Driven Conformance Checking for Virtual/Silicon Devices Using Mutation Testing

10. Beyond Tests

11. Directed Test Generation for Activation of Security Assertions in RTL Models

12. Deep Learning-Based Hybrid Fuzz Testing

13. Exploratory Review of Hybrid Fuzzing for Automated Vulnerability Detection

14. Gaining trust by tracing security protocols

15. Automated Patch Transplantation

16. Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation

17. Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs

18. Report on the Differential Testing of Static Analyzers

19. Evaluating Synthetic Bugs

20. Analyzing system software components using API model guided symbolic execution

21. Modified condition/decision coverage (MC/DC) oriented compiler optimization for symbolic execution

22. On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code

23. ConTesa: Directed Test Suite Augmentation for Concurrent Software

24. CSEFuzz: Fuzz Testing Based on Symbolic Execution

25. Automated Data-Processing Function Identification Using Deep Neural Network

26. Differential Testing of Certificate Validation in SSL/TLS Implementations

27. Are we done yet? Our Journey to Fight against Memory-safety Bugs

28. Delta-based verification of software product families

29. AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis

30. SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning

32. Risks of Concurrent Execution in E-Commerce Processes

33. The Impact of Compiler Optimizations on Symbolic Execution

34. Inferring Relations Among Test Programs in Microservices Applications

35. Symbolic Model-based Design and Generation of Logical Scenarios for Autonomous Vehicles Validation

36. Synthesize solving strategy for symbolic execution

37. AngErza: Automated Exploit Generation

38. A Framework for the Composition of IoT and CPS Capabilities

39. QFuzz: Quantitative Fuzzing for Side Channels

40. Towards a Hybrid Approach to Protect Against Memory Safety Vulnerabilities

41. Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method

42. OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept

43. NFReducer: Redundant Logic Elimination for Network Functions with Runtime Configurations

44. On the Feasibility of Automated Built-in Function Modeling for PHP Symbolic Execution

45. Vulnerabilities Detection via Static Taint Analysis

46. Implementation of an effective dynamic concolic execution framework for analyzing binary programs

47. Unit Test Data Generation for C Using Rule-Directed Symbolic Execution

48. A synergistic approach to improving symbolic execution using test ranges

49. A dynamic approach to detecting, eliminating and fixing memory leaks

50. Quantifying the Information Leakage in Cache Attacks via Symbolic Execution

Catalog

Books, media, physical & digital resources